Computational Intelligence in Security for Information Systems 2010: Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS’10)
Álvaro Herrero, Emilio Corchado, Carlos Redondo Gil, Ángel Alonso Alvarez
Springer Science & Business Media, Oct 7, 2010 - Computers - 240 pages
rd The 3 International Conference on Computational Intelligence in Security for Information Systems (CISIS 2010) provided a broad and interdisciplinary forum to present the most recent developments in several very active scientific areas such as Machine Learning, Infrastructure Protection, Intelligent Methods in Energy and Transportation, Network Security, Biometry, Cryptography, High-performance and Grid Computing, and Industrial Perspective among others. The global purpose of CISIS series of conferences has been to form a broad and interdisciplinary meeting ground offering the opportunity to interact with the leading research team and industries actively involved in the critical area of security, and have a picture of the current solutions adopted in practical domains. This volume of Advances in Intelligence and Soft Computing contains accepted papers presented at CISIS 2010, which was held in León, Spain, on November 11–12, 2010. CISIS 2010 received over 50 technical submissions. After a thorough peer-review process, the International Program Committee - lected 25 papers which are published in this conference proceedings. This allowed the Scientific Committee to verify the vital and crucial nature of the topics - volved in the event, and resulted in an acceptance rate close to 50% of the ori- nally submitted manuscripts.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
access control AISC 85 algorithm analysis Analyzer agents anomaly detection applied approach attacks Berlin Heidelberg 2010 bits BPEL BSDT business processes CISIS clustering CMLHL coefficients Computer constraints Corchado data mining data points database dataset DBSCAN defined Engineering evaluation extracted face recognition fault tolerance feature vector fingerprinting fuzzy classifier Genetic Algorithm hash Heidelberg Herrero Hidden Markov Model IEEE implementation input International Conference Intrusion Detection Intrusion Response kernel function learning Machine Learning method Netflow network traffic Neural Networks neuron node ontology operator output paper parameters performance permutation phase PN sequence problem projection proposed protocol PSNR query RBAC retrieval ROCs roles Section sequence signal solution speech Springer Springer-Verlag Berlin Heidelberg springerlink.com SQL injection sub-tasks Support Vector Machine task techniques Technology tion tree University of León users values visual watermark workflow